메뉴 건너뛰기




Volumn 3924 LNCS, Issue , 2006, Pages 180-196

Flow locks: Towards a core calculus for dynamic flow policies

(2)  Broberg, Niklas a   Sands, David a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); CODES (SYMBOLS); COMPUTER PROGRAMMING LANGUAGES; DATA PROCESSING; INFORMATION ANALYSIS; INTERFACES (COMPUTER); SECURITY OF DATA; SEMANTICS; CALCULATIONS; COMPUTATIONAL LINGUISTICS; INFORMATION DISSEMINATION; LOCKS (FASTENERS); STREAM FLOW;

EID: 33745794062     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11693024_13     Document Type: Conference Paper
Times cited : (45)

References (23)
  • 3
    • 33646080360 scopus 로고    scopus 로고
    • Security-typed languages for implementation of cryptographic protocols: A case study
    • Proc. European Symp. on Research in Computer Security
    • A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In Proc. European Symp. on Research in Computer Security, volume 3679 of LNCS, 2005.
    • (2005) LNCS , vol.3679
    • Askarov, A.1    Sabelfeld, A.2
  • 4
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • Mar.
    • A. Banerjee and D. A. Naumann. Stack-based access control and secure information flow. Journal of Functional Programming, 15(2):131-177, Mar. 2005.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 6
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 8
    • 35048815139 scopus 로고    scopus 로고
    • Controlled downgrading based on intransitive (non)interference
    • Proc. Asian Symp. on Programming Languages and Systems, Springer-Verlag, Nov.
    • H. Mantel and D. Sands. Controlled downgrading based on intransitive (non)interference. In Proc. Asian Symp. on Programming Languages and Systems, volume 3302 of LNCS, pages 129-145. Springer-Verlag, Nov. 2004.
    • (2004) LNCS , vol.3302 , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 11
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • May
    • A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symp. on Security and Privacy, pages 186-197, May 1998.
    • (1998) Proc. IEEE Symp. on Security and Privacy , pp. 186-197
    • Myers, A.C.1    Liskov, B.2
  • 14
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive non-interference
    • May
    • S. Pinsky. Absorbing covers and intransitive non-interference. In Proc. IEEE Symp. on Security and Privacy, pages 102-113, May 1995.
    • (1995) Proc. IEEE Symp. on Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 15
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • SRI International
    • J. M. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, 1992.
    • (1992) Technical Report , vol.CSL-92-02
    • Rushby, J.M.1
  • 20
    • 24644494868 scopus 로고    scopus 로고
    • Designing a security-typed language with certificate-based declassification
    • Proc. European Symp. on Programming, Springer-Verlag, Apr.
    • S. Tse and S. Zdancewic. Designing a security-typed language with certificate-based declassification. In Proc. European Symp. on Programming, volume 3444 of LNCS, pages 279-294. Springer-Verlag, Apr. 2005.
    • (2005) LNCS , vol.3444 , pp. 279-294
    • Tse, S.1    Zdancewic, S.2
  • 21
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.